debatem1 / pypbc
A defunct and ancient set of python bindings for Pairing Based Cryptography
☆51Updated last year
Alternatives and similar repositories for pypbc:
Users that are interested in pypbc are comparing it to the libraries listed below
- ☆26Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆95Updated 3 years ago
- Attribute-based Encryption☆195Updated 4 years ago
- ☆20Updated 6 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- Attribute-based Encryption☆23Updated last year
- This project gives the python implementation of a space efficient searchable encryption algorithm☆53Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- multi-authority attribute based encryption☆43Updated 4 years ago
- Boolean Query SSE schemes☆15Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆39Updated 6 years ago
- Paper Notes in MPC with Applications to PPML☆68Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆61Updated 2 years ago
- Decentralized CP-ABE☆114Updated 3 months ago
- FAME CP-ABE Encryption based on JPBC☆29Updated 5 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- C++ OT extension implementation☆127Updated 4 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆19Updated last year
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆112Updated last year
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆170Updated 7 months ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Updated 8 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆184Updated 4 years ago
- LSSS, ABE☆15Updated 4 years ago
- Private set intersection implemented in Python☆101Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year